Iranian hackers ‘tickle’ targets in US, UAE with custom tool, Microsoft says
Peach Sandstorm is said to have focused on the oil and gas, satellite, government and communications sectors.
Peach Sandstorm is said to have focused on the oil and gas, satellite, government and communications sectors.
Tehran’s latest hacking activity involves easy-to-detect techniques to gain access and then pivoting to stealthier methods.
BlackBerry Cylance researchers think they’ve found a possible shell company for Chinese hackers known as the Winnti group.
A failure to patch has enabled a three-year running hacking campaign.
Iran could leverage its considerable hacking capabilities, which it has built up in recent years, to disrupt U.S. organizations.
The only true way to predict computer security is to hear from the machines themselves.
The new research is the latest indication of Iran’s disruptive capabilities in cyberspace.
Given that the group has been linked with data-wiping hacks in the past, the new activity has analysts’ full attention.
The Iranian hackers also set up their own virtual private network with “exit nodes” that change frequently, according to Trend Micro.
Microsoft has tied the attacks — some of which have been successful — with a group linked with Iran (APT 33), with a group from North Korea (APT 38), as well as with two groups linked with Russia (APT 28 and APT 29).